Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 23:16

General

  • Target

    5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe

  • Size

    96KB

  • MD5

    e7b50c2f2b86a2d531379e54feca0927

  • SHA1

    90c9357d78ca70cfcba9dbc4eb59260669fbd2c9

  • SHA256

    5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b

  • SHA512

    76e37ac2853146348252a8fb63c6c1765072d3b664b7198aa55a049cf0eefc478a23d4ec5fcf49c95f5dcec7bce1cc2817202af958f1acf5e13c964b346646ab

  • SSDEEP

    1536:ygqRorQ5n0GL/g6DneDv8/NeT9aGt4JvRGFQlAuPRKj7on7OBDr0wmuDQi65SMwc:ydoMZ/lwkI9agk5PRK3onCr/pSSfz1AV

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 11 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe
    "C:\Users\Admin\AppData\Local\Temp\5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\Cfhkhd32.exe
      C:\Windows\system32\Cfhkhd32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\Dmbcen32.exe
        C:\Windows\system32\Dmbcen32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\SysWOW64\Dpapaj32.exe
          C:\Windows\system32\Dpapaj32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 144
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Cfhkhd32.exe

    Filesize

    96KB

    MD5

    754987708c8589990f11664200e7c7dc

    SHA1

    f5bd356331dcc466478d17ecc7394d680aa61123

    SHA256

    d8bbd9e8687afb4f0f94bf5d88ecd3b57a855da212b4c16e12bac787b1d2bcac

    SHA512

    e10129cf6edb17a164162f92a33d540ae413510aa698a9883709517b05dac74b04ea8bf6f7f0ba1cc90654427d9c15f1b6200df10c48570e5e0223679c01a286

  • C:\Windows\SysWOW64\Dmbcen32.exe

    Filesize

    96KB

    MD5

    01faab03bb73eff0d99ab3168ef731fa

    SHA1

    9098afba0332fce4550833769bfa3816df498a61

    SHA256

    6ab6bfed3994c97fd9b68bb7b03d3eaef2dde55f214d7ccf3310dcbfbd101943

    SHA512

    58ada84759815e60922f7a0617798ec873ab52eccb466b25d61d754f784e246830f955ce6ef3412088352e7233ae055374cb726fcf254873c63c62108cce60e3

  • C:\Windows\SysWOW64\Dpapaj32.exe

    Filesize

    96KB

    MD5

    e5717a26def42198aaafb9d60ae88d6d

    SHA1

    f962bf2c7610b16cb3c78a8acd863a1f8b5035a9

    SHA256

    675cd59be85a517af46d63d3888a7bba2276e69e13e2f9969d9f489551131fe7

    SHA512

    f7e0436a77b01841d3ca6a8ae817e44b7ff8f0f5cee8f22395a615a175b5b8d83bc401902e16763b8c4e85e0a6c691d3ca958ec1985650e214098737c0e938d1

  • memory/2588-41-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2588-53-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2688-13-0x0000000000290000-0x00000000002C4000-memory.dmp

    Filesize

    208KB

  • memory/2688-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2688-12-0x0000000000290000-0x00000000002C4000-memory.dmp

    Filesize

    208KB

  • memory/2688-51-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2692-40-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/2692-27-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2692-52-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2848-14-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2848-48-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB